Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

S3K170A /S3K140A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software
ANSSI-CC-2018/13
Samsung S3FT9PE 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software (révision 0)
ANSSI-CC-2018/26
name S3K170A /S3K140A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software Samsung S3FT9PE 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software (révision 0)
not_valid_before 2018-04-04 2018-07-18
not_valid_after 2023-04-04 2023-07-18
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_13en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2018_26en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_13.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018-26fr.pdf
state/report/pdf_hash 4f41069c705db44788a91ac30a76139d889b0f6e3282cab02905f2bed7fdfe23 3341133fcd563f3ab5f2193482d65d8a3a49bdceb3c30d8b4f6ffeada29bd124
state/report/txt_hash 8128a873f81db5e6e8333c4a52725a81cd1e44f99d7eb4020167fe470f885c2f 36bf03cd2b14402b53b1b8eb4004c2b0181809e075c28b5400a9dd99fe82aa54
state/st/pdf_hash 272c4bd5fa46faca96a3e764b4f84d2eccf63ea804abdf906fc624f205c738d3 7d7288045f30bafe2ac91bf09235fbc8acf32b3b77af897c0d49055a21d97b5b
state/st/txt_hash 73d452081f2eb32ea279e069934714f8edaec73bf6a9abdf232379c632234996 f9c269a10ad2fd20da7b97ae1c186c4f4e917621d04c7d56f40120e324498cb2
heuristics/cert_id ANSSI-CC-2018/13 ANSSI-CC-2018/26
heuristics/extracted_versions 32 0, 16
heuristics/report_references/directly_referenced_by ANSSI-CC-2019/02, ANSSI-CC-2018/14 ANSSI-CC-2019/19
heuristics/report_references/directly_referencing ANSSI-CC-2018/12, ANSSI-CC-2017/12 ANSSI-CC-2014/59
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2019/03, ANSSI-CC-2021/04, ANSSI-CC-2021/05, ANSSI-CC-2019/61, ANSSI-CC-2019/02, ANSSI-CC-2019/51, ANSSI-CC-2019/60, ANSSI-CC-2018/14, ANSSI-CC-2021/06 ANSSI-CC-2019/19
heuristics/report_references/indirectly_referencing ANSSI-CC-2017/11, ANSSI-CC-2017/53, ANSSI-CC-2018/12, ANSSI-CC-2017/12 ANSSI-CC-2013/46, ANSSI-CC-2014/59, ANSSI-CC-2014/37
heuristics/scheme_data/cert_id 2018/13 2018/26
heuristics/scheme_data/description Le produit certifié est la famille de microcontrôleurs « S3K170A /S3K140A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software, version S3K170A/S3K140A_rev0_SW10-00-10-20-10-100-103_GU14-16-14-005-102-091-11-12-12-08-00 » développée par SAMSUNG ELECTRONICS CO. LTD. Les deux microcontrôleurs ont le même layout. La seule différence e Le produit certifié est « Samsung S3FT9PE 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software, revision 0 » développé par SAMSUNG ELECTRONICS CO. LTD.. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plas
heuristics/scheme_data/enhanced/cert_id 2018/13 2018/26
heuristics/scheme_data/enhanced/certification_date 04/04/2018 18/07/2018
heuristics/scheme_data/enhanced/protection_profile BSI-CC-PP-0084-2014 PP0035
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2018/04/anssi-cc-2018_13.pdf https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018-26fr.pdf
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2018/04/anssi-cible-cc-2018_13en.pdf https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-2018_26en.pdf
heuristics/scheme_data/product S3K170A /S3K140A 32-bit RISC Microcontroller for Smart Cardwith optional AT1 Secure Libraries including specific IC Dedicated software Samsung S3FT9PE 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software (révision 0)
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/s3k170a-s3k140a-32-bit-risc-microcontroller-smart-cardwith-optional-at1-secure-0 https://cyber.gouv.fr/produits-certifies/samsung-s3ft9pe-16-bit-risc-microcontroller-smart-card-optional-secure-rsaeccsha
pdf_data/report_filename anssi-cc-2018_13.pdf anssi-cc-2018-26fr.pdf
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2018/13 ANSSI-CC-2018/26
pdf_data/report_frontpage/FR/cert_item S3K170A /S3K140A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software Samsung S3FT9PE 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software
pdf_data/report_frontpage/FR/cert_item_version S3K170A/S3K140A_rev0_SW10-00-10-20-10-100- 103_GU14-16-14-005-102-091-11-12-12-08-00 revision 0
pdf_data/report_frontpage/FR/cert_lab CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
pdf_data/report_frontpage/FR/ref_protection_profiles Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC”, “Loader dedicated for usage in Secured Environment only”, “Loader dedicated for usage by authorized users only PP0035] : Security IC platform Protection Profile Version 1.0
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2018/13: 20
  • ANSSI-CC-2017/12: 3
  • ANSSI-CC-2018/12: 3
  • ANSSI-CC-2018/26: 18
  • ANSSI-CC-2014/59: 2
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 1
  • BSI-PP-0084-2014: 1
  • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 2 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL 5: 3
  • EAL2: 2
  • EAL7: 1
  • EAL 1: 1
  • EAL 3: 1
  • EAL 7: 1
  • EAL5+: 1
  • EAL6: 1
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 4
pdf_data/report_keywords/crypto_library
  • AT1:
    • AT1 Secure RSA/ECC/SHA library: 1
pdf_data/report_keywords/randomness/TRNG/DTRNG 20 13
pdf_data/report_keywords/standard_id/BSI
  • AIS 31: 2
  • AIS31: 1
  • AIS 31: 2
  • AIS 34: 1
  • AIS34: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/vendor/Samsung/Samsung 5 17
pdf_data/report_metadata//Category Référence, Version revision 0
pdf_data/report_metadata//CreationDate D:20180409173706+02'00' D:20180727165330+02'00'
pdf_data/report_metadata//ModDate D:20180410105159+02'00' D:20180730170359+02'00'
pdf_data/report_metadata//SourceModified D:20180409153703 D:20180727145327
pdf_data/report_metadata/pdf_file_size_bytes 363393 331815
pdf_data/report_metadata/pdf_number_of_pages 19 17
pdf_data/st_filename anssi-cible-cc-2018_13en.pdf anssi-cible-2018_26en.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 28 25
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 15 7
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 21 14
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 4 2
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA 6 2
pdf_data/st_keywords/cc_claims/O
  • O.RSA: 6
  • O.ECC: 2
  • O.RND: 6
  • O.ECDSA: 6
  • O.TDES: 7
  • O.SHA: 6
  • O.ECDH: 4
  • O.MEM_ACCESS: 1
  • O.RNG: 1
  • O.RND: 5
  • O.MEM_ACCESS: 1
pdf_data/st_keywords/cc_claims/O/O.RND 6 5
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084: 1
  • BSI-PP-0084: 1
  • BSI-CC-PP-0084-: 1
  • BSI-PP-0035: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARV: 1
    • ADV_FSP: 2
    • ADV_IMP: 1
    • ADV_VAN: 1
    • ADV_ARC.1: 6
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
    • ADV_FSP.4: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_DVS.2: 7
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_CMS: 2
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
    • ALC_DVS.1: 1
    • ALC_CMS.4: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 13
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ADV:
    • ADV_ARV: 1
    • ADV_FSP: 2
    • ADV_IMP: 1
    • ADV_VAN: 1
    • ADV_ARC.1: 7
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
    • ADV_FSP.4: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_DVS.2: 7
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_CMS: 2
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
    • ALC_DVS.1: 1
    • ALC_CMS.4: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 13
    • AVA_VAN: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 6 7
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 2 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 13
  • AVA_VAN.5: 13
  • AVA_VAN: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 8
    • FAU_GEN: 2
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
    • FAU_GEN.1: 1
  • FCS:
    • FCS_RNG: 22
    • FCS_RNG.1: 17
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_COP.1: 18
    • FCS_COP: 44
    • FCS_CKM.1: 23
    • FCS_CKM.4: 15
    • FCS_CKM: 13
    • FCS_CKM.2: 4
  • FDP:
    • FDP_SDC: 4
    • FDP_ACF: 14
    • FDP_SDC.1: 14
    • FDP_SDI: 1
    • FDP_SDI.2: 8
    • FDP_SDI.1: 2
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_ACC.1: 20
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ACF.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_ACC: 10
    • FDP_IFC: 1
    • FDP_ITT: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 12
    • FIA_API.1.1: 2
  • FMT:
    • FMT_LIM: 22
    • FMT_LIM.1: 28
    • FMT_LIM.2: 32
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 16
    • FMT_MSA.1: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 6
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_CKM.4: 1
    • FMT_MSA: 2
    • FMT_SMF: 1
  • FPT:
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_PHP: 3
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_FLS: 1
    • FPT_ITT: 1
  • FRU:
    • FRU_FLT.2: 17
    • FRU_FLT.1: 1
    • FRU_FLT.2.1: 1
    • FRU_FLT: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
  • FAU:
    • FAU_SAS: 8
    • FAU_GEN: 2
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
    • FAU_GEN.1: 1
  • FCS:
    • FCS_RNG: 6
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
    • FCS_COP.1: 24
    • FCS_COP: 33
    • FCS_CKM.1: 26
    • FCS_CKM.4: 14
    • FCS_CKM: 9
    • FCS_CKM.2: 4
  • FDP:
    • FDP_ACF: 2
    • FDP_ITT.1: 17
    • FDP_ITT.1.1: 1
    • FDP_ACC.1: 14
    • FDP_IFC.1: 18
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ACF.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_SDI.1: 1
    • FDP_ACC: 1
    • FDP_IFC: 1
    • FDP_ITT: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 24
    • FMT_LIM.2: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 13
    • FMT_MSA.1: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 6
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_CKM.4: 1
    • FMT_MSA: 2
    • FMT_SMF: 1
  • FPT:
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_PHP: 3
    • FPT_ITT.1: 15
    • FPT_ITT.1.1: 1
    • FPT_FLS: 1
    • FPT_ITT: 1
  • FRU:
    • FRU_FLT.2: 17
    • FRU_FLT.1: 1
    • FRU_FLT: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 13 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 23 26
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 15 14
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 44 33
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 18 24
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 22 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 17 14
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 1 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC: 4
  • FDP_ACF: 14
  • FDP_SDC.1: 14
  • FDP_SDI: 1
  • FDP_SDI.2: 8
  • FDP_SDI.1: 2
  • FDP_ITT.1: 18
  • FDP_ITT.1.1: 1
  • FDP_ACC.1: 20
  • FDP_IFC.1: 23
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 3
  • FDP_ACF.1: 17
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 11
  • FDP_ITC.2: 11
  • FDP_UCT.1: 9
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 9
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ACC: 10
  • FDP_IFC: 1
  • FDP_ITT: 1
  • FDP_ACF: 2
  • FDP_ITT.1: 17
  • FDP_ITT.1.1: 1
  • FDP_ACC.1: 14
  • FDP_IFC.1: 18
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 3
  • FDP_ACF.1: 10
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 11
  • FDP_ITC.2: 11
  • FDP_SDI.1: 1
  • FDP_ACC: 1
  • FDP_IFC: 1
  • FDP_ITT: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 10 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 20 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 14 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 17 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 23 18
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 18 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 22 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 28 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 32 28
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 16 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 22 21
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 16 15
pdf_data/st_keywords/cc_sfr/FRU
  • FRU_FLT.2: 17
  • FRU_FLT.1: 1
  • FRU_FLT.2.1: 1
  • FRU_FLT: 1
  • FRU_FLT.2: 17
  • FRU_FLT.1: 1
  • FRU_FLT: 1
pdf_data/st_keywords/cipher_mode/ECB/ECB 2 3
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 12
pdf_data/st_keywords/crypto_library
  • AT1:
    • AT1 Secure RSA/ ECC Library v1.00: 1
    • AT1 Secure RSA/ ECC Library v1.03: 1
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement 3 2
pdf_data/st_keywords/ecc_curve/NIST/P-256 8 6
pdf_data/st_keywords/randomness/RNG/RND 11 10
pdf_data/st_keywords/randomness/RNG/RNG 14 3
pdf_data/st_keywords/randomness/TRNG/DTRNG 48 40
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 3
  • Malfunction: 26
  • malfunction: 13
  • DFA: 4
  • physical tampering: 2
  • Malfunction: 27
  • malfunction: 11
  • DFA: 5
  • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI/DFA 4 5
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 26 27
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 13 11
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 3 2
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 7 9
pdf_data/st_keywords/side_channel_analysis/SCA/SPA 6 8
pdf_data/st_keywords/side_channel_analysis/SCA/side-channel 4 2
pdf_data/st_keywords/side_channel_analysis/SCA/timing attack 2 5
pdf_data/st_keywords/side_channel_analysis/other/reverse engineering 5 2
pdf_data/st_keywords/standard_id/BSI/AIS31 7 4
pdf_data/st_keywords/standard_id/BSI/BSI-AIS31 3 6
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 3 2
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-003 3 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 180-3: 6
  • FIPS PUB 180-3: 6
  • FIPS197: 1
  • FIPS 197: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 10
    • 3DES:
      • Triple-DES: 6
      • TDES: 14
      • TDEA: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 14
  • DES:
    • DES:
      • DES: 8
    • 3DES:
      • 3DES: 6
      • Triple-DES: 1
      • TDEA: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 6
  • TDES: 14
  • TDEA: 1
  • 3DES: 6
  • Triple-DES: 1
  • TDEA: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 6 1
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 10 8
pdf_data/st_keywords/vendor/Samsung/Samsung 18 3
pdf_data/st_metadata//CreationDate D:20171024135623+09'00' D:20180320160556+09'00'
pdf_data/st_metadata//ModDate D:20180410105209+02'00' D:20180730170350+02'00'
pdf_data/st_metadata/pdf_file_size_bytes 1212627 872629
pdf_data/st_metadata/pdf_number_of_pages 110 69
dgst 4c6dc8ce75e3c574 9b2c86094e98533d